Method for monitoring software using encryption including digital signatures/certificates
First Claim
1. A method for reducing unauthorized use of computer software, the method comprising:
- supplying a first activation code with the computer software;
requiring entry of the first activation code to at least partially enable the computer software on a computer for use by a computer software used during an initial authorization period;
contacting a computer software representative to obtain at least one additional activation code to repeat the enablement of the computer software on the computer for use by the computer software user during a subsequent authorization period after the initial authorization period and allowing the repeat of the enablement of the computer software to be performed prior to the expiration of the initial authorization period such that the enablement of the computer software can be continuous from the initial authorization period to the subsequent authorization period, the computer software being enabled during the subsequent authorization period without requiring further contact with the computer software representative following entry of the at least one additional activation code;
collecting registration information from at least one of the computer software user and the computer upon contact with the computer software representative;
transferring the at least one additional activation code from the computer software representative to at least one of the computer software, the computer software user, and the computer using a digital signature or certificate to resist modification of the activation code; and
verifying authenticity of the digital signature or certificate before allowing the computer software to operate on the computer.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for reducing unauthorized software use include generating a key based on computer-specific information of a computer on which the software is installed and using the key to encrypt an authorization code which enables use of the software on the computer. A representative maintains contact with the software user as a new authorization code from the representative is required after some period of use of the software. The representative encrypts the new password using the key and transfers the encrypted key to authorize use of the software for a next period of use. The encrypted password is a form of digital signature or certificate which is unique to a particular computer and limits use of the software to the particular computer. The key may be generated using various computer-specific information such as the motherboard/processor identification, the number of bad sectors or hard disk identification, and/or the amount of installed memory.
-
Citations
40 Claims
-
1. A method for reducing unauthorized use of computer software, the method comprising:
-
supplying a first activation code with the computer software;
requiring entry of the first activation code to at least partially enable the computer software on a computer for use by a computer software used during an initial authorization period;
contacting a computer software representative to obtain at least one additional activation code to repeat the enablement of the computer software on the computer for use by the computer software user during a subsequent authorization period after the initial authorization period and allowing the repeat of the enablement of the computer software to be performed prior to the expiration of the initial authorization period such that the enablement of the computer software can be continuous from the initial authorization period to the subsequent authorization period, the computer software being enabled during the subsequent authorization period without requiring further contact with the computer software representative following entry of the at least one additional activation code;
collecting registration information from at least one of the computer software user and the computer upon contact with the computer software representative;
transferring the at least one additional activation code from the computer software representative to at least one of the computer software, the computer software user, and the computer using a digital signature or certificate to resist modification of the activation code; and
verifying authenticity of the digital signature or certificate before allowing the computer software to operate on the computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method for reducing unauthorized use of computer software by limiting use of the computer software to a specific computer, the method comprising:
-
supplying a first activation code with the computer software;
requiring entry of the first activation code to at least partially enable the computer software on a computer for use by a computer software user during an initial authorization period;
contacting a computer software agent to obtain at least one additional activation code to repeat the enablement of the computer software on the computer for use by the computer software user during a subsequent authorization period after the initial authorization period and allowing the repeat of the enablement of the computer software to be performed prior to the expiration of the initial authorization period such that the enablement of the computer software can be continuous from the initial authorization period to the subsequent authorization period, the computer software being enabled during the subsequent authorization period without requiring further contact with the commuter software agent following entry of the at least one additional activation code;
automatically collecting computer-specific information from the computer and transferring the collected computer-specific information to the computer software agent;
encrypting digital information at least partially using the computer-specific information;
receiving the encrypted digital information from the computer software agent;
allowing the computer software to operate on the computer during an authorization period only if the digital information can be decrypted by the computer using the computer-specific information; and
repeating the steps of automatically collecting, encrypting, receiving, and allowing at predetermined periods. - View Dependent Claims (17, 18, 19, 20, 21, 22, 24, 25)
-
-
23. The method of 16 wherein:
each authorization period is based on elapsed running time of the computer software.
-
26. A method for providing periodic contact with a computer software user to repeatedly transfer information to the computer software user, the method comprising:
-
supplying a first activation code with the computer software;
requiring entry of the first activation code to at least partially enable the computer software on a computer for use by a computer software user during an initial authorization period;
contacting a computer software agent to obtain at least one additional activation code to repeat the enablement of the computer software on the computer for use by the computer software user during a subsequent authorization period after the initial authorization period and allowing the repeat of the enablement of the computer software to be performed prior to the expiration of the initial authorization period such that the enablement of the computer software can be continuous from the initial authorization period to the subsequent authorization period, the computer software being enabled during the subsequent authorization period without requiring further contact with the computer software agent following entry of the at least one additional activation code;
receiving registration material from at least one of the computer software user and the computer upon contact with the computer software agent;
encrypting at least a portion of information to be transferred to the computer software user based on the registration material;
transferring the information to the computer software user using a digital signature, a digital certificate, or a digital wrapper; and
repeating the steps of receiving, encrypting, and transferring at predetermined periods. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40)
-
Specification